A Fast Algorithm for Scheduling Detection-and-Rescue Operations Based on Data from Wireless Sensor Networks
نویسندگان
چکیده
The need for the search, detection and rescue of disaster survivors arises in many emergency situations in military and civil applications. Suppose a number of people are trapped in ruins after an earthquake or tsunami. Their medical condition depends on their location, detection time and the time of the rescue operation. In order to efficiently detect and perform the needed rescue operations, a network of wireless sensors is used which provide acoustic, seismic, electromagnetic, gravimetric and other information. The information is processed automatically to yield prior probabilities of location and expected rescue times for each potential target. The acquired information from the sensors is imperfect because under extraordinary and severe circumstances, two types of errors may occur: (i) a "false-negative detection test” – it is a case when a target is overlooked during the test; and (ii) a "false-positive detection", or "false alarm" – when a not-a-target location is wrongly classified as a sought target. Therefore, non-zero probabilities of overlooking a hidden target and a "false alarm" exist. We suggest a two-phase solution to the problem of scheduling detection and rescue operations. First, the disaster area is divided into sub-areas and available rescue teams and sensors are assigned. Second, a schedule is found for the rescue teams to perform the rescue operations (in parallel). We seek to find the best coverage of the disaster sub-areas served by rescue teams and to schedule the search-and-rescue operations in each sub-area while minimizing the search-andrescue time and maximizing the number of saved lives within a given search time limit. The problem is formulated as a non-standard two-stage assignment / scheduling problem and a fast combinatorial real-time algorithm is suggested.
منابع مشابه
Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملFDMG: Fault detection method by using genetic algorithm in clustered wireless sensor networks
Wireless sensor networks (WSNs) consist of a large number of sensor nodes which are capable of sensing different environmental phenomena and sending the collected data to the base station or Sink. Since sensor nodes are made of cheap components and are deployed in remote and uncontrolled environments, they are prone to failure; thus, maintaining a network with its proper functions even when und...
متن کاملENERGY AWARE DISTRIBUTED PARTITIONING DETECTION AND CONNECTIVITY RESTORATION ALGORITHM IN WIRELESS SENSOR NETWORKS
Mobile sensor networks rely heavily on inter-sensor connectivity for collection of data. Nodes in these networks monitor different regions of an area of interest and collectively present a global overview of some monitored activities or phenomena. A failure of a sensor leads to loss of connectivity and may cause partitioning of the network into disjoint segments. A number of approaches have be...
متن کاملA multi-hop PSO based localization algorithm for wireless sensor networks
A sensor network consists of a large number of sensor nodes that are distributed in a large geographic environment to collect data. Localization is one of the key issues in wireless sensor network researches because it is important to determine the location of an event. On the other side, finding the location of a wireless sensor node by the Global Positioning System (GPS) is not appropriate du...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Research in Computing Science
دوره 104 شماره
صفحات -
تاریخ انتشار 2015